Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

Swiftkey
angry user wifi wi fibad connection

Android character at MWC 2014 Barcelona

New Android Trojan SpyNote leaks on underground forums

A new and potent Android Trojan has been leaked on several underground forums, making it available for free to less resourceful cybercriminals who are now likely to use it in attacks.

question marks pavement

Attack attribution does little to improve enterprise security

Improving a company’s defenses should be the top priority after a hack, not spending time trying to attribute the attack.

There are mobile and IoT companion documents for the CIS (Top 20) Critical Security Controls

Security practitioners are familiar with the Center for Internet Security (CIS) Critical Security Controls. Did you know there are versions of these controls tailored to mobile and Internet of Things?

Edward Snowden

WikiLeaks' methods questioned by whistleblower Edward Snowden

Former National Security Agency contractor, Edward Snowden, has censured WikiLeaks’ release of information without proper curation.

nup 171016 0051

FBI said to investigate possible hack of another Democratic Party organization

The FBI is said to be investigating yet another suspected hack of a Democratic Party organization, this time of the Democratic Congressional Campaign Committee that raises funds for Democrats running for the House of Representatives.

Donald Trump

Trump's hacking comment rattles the cybersecurity industry

Donald Trump’s muddled stance on hacking has disturbed security experts at time when the tech industry is looking for clarity on the U.S.'s cyber policy.

black hat conference 2015

Black Hat: 9 free security tools for defense & attacking

When Black Hat convenes next week in Las Vegas, it will be a rich environment for gathering tools that can be used to tighten security but also - in the wrong hands - to carry out exploits.

Bugs & Bugs logo

Bugs & Bugs: National Moth Week, PHP, Black Hat & more

National Moth Week, Black Hat exploit presentations, edible insects, Pornhub bug bounty & Zica prevention at the Rio Olympics all come up on Bugs & Bugs Facebook Live event

Anticipating Black Hat

The Black Hat conference heads to Vegas next week, with a big interest in anti-ransomware, endpoint security, security analytics, cloud and IoT security.

code big data binary programming

Long-running malvertising campaign infected thousands of computers per day

Security researchers have shut down a large-scale malvertising operation that used sophisticated techniques to remain undetected for months and served exploits to millions of computers.

Android N statue

Google beefs Linux up kernel defenses in Android

The future versions of Android will be more resilient to exploits thanks to developers' efforts to integrate the latest Linux kernel defenses into the operating system.a

missing puzzle piece

How to attract a board-level cybersecurity expert

Suzanne Vautrinot’s impressive cybersecurity experience has been in high demand since she retired from the U.S. Air Force in October 2013. As a major general and commander, she helped create the DoD's U.S. Cyber Command and led the...

video

Security Sessions: Generational differences in security, privacy attitudes

In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild chats with Ted Harrington of Independent Security Evaluators about how different generations (mainly millennials and Baby Boomers) view both security and...

20160224 stock mwc microsoft windows 10 signs

Microsoft makes Windows 10 hardware change for PC security

Microsoft will start enforcing a change in minimum hardware requirement for Windows 10 PCs and mobile devices, and expects hardware makers to comply.

Jeremy Spilman, TapLink Founder & CEO

Citrix & LogMeIn complete complicated, tax-free sort-of merger

LogMeIn, the makers of the popular remote desktop software as well as IT security and other offerings, will become part of a Citrix subsidiary in the wake of a complicated, $1.8 billion transaction announced Tuesday by the two...

LastPass

Flaw with password manager LastPass could hand over control to hackers

Password manager LastPass can even be fooled. A Google security researcher has found a way to remotely hijack the software.

mr robot elliot

Kaspersky researchers love “Mr. Robot” hacker but claim no Snowden ties

Malware researchers for Kaspersky Lab took to Reddit’s IAmA chat today and pronounced an affection for the hacker-hero TV show “Mr. Robot” but not NSA hacker Edward Snowden.

Donald Trump

Donald Trump encouraged Russia to hack Hillary Clinton's email

Presidential candidate Donald Trump has called on Russia to hack his rival Hillary Clinton’s emails.

Load More